FreeBSD : rt -- XSS via jQuery (416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42)

medium Nessus Plugin ID 122657

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

BestPractical reports :

The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting (XSS) vulnerability when using cross-domain Ajax requests.
This vulnerability is assigned CVE-2015-9251. RT does not use this jQuery feature so it is not directly vulnerable. jQuery version 1.12 no longer receives official updates, however a fix was posted with recommendations for applications to patch locally, so RT will follow this recommendation and ship with a patched version.

Solution

Update the affected packages.

See Also

https://docs.bestpractical.com/release-notes/rt/4.4.4

https://docs.bestpractical.com/release-notes/rt/4.2.16

http://www.nessus.org/u?7f36c19e

Plugin Details

Severity: Medium

ID: 122657

File Name: freebsd_pkg_416ca0f43fe011e9bbdd6805ca0b3d42.nasl

Version: 1.2

Type: local

Published: 3/7/2019

Updated: 2/6/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:rt42, p-cpe:/a:freebsd:freebsd:rt44, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 3/6/2019

Vulnerability Publication Date: 3/5/2019

Reference Information

CVE: CVE-2015-9251